Searched refs:secret (Results 1 - 14 of 14) sorted by relevance

/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DFakeStorageManager.java35 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { argument
36 getUserAuth(userId).add(new Pair<>(token, secret));
58 throw new AssertionFailedError("More than one secret exists");
63 public void unlockUser(int userId, byte[] secret, IProgressListener listener) argument
68 if (secret != null) {
70 throw new AssertionFailedError("More than one secret exists");
73 if ((!mIgnoreBadUnlock) && auth.second != null && !Arrays.equals(secret, auth.second)) {
74 throw new AssertionFailedError("Invalid secret to unlock user");
H A DCachedSyntheticPasswordTests.java110 // Ensure the same secret was passed each time
111 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class);
112 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture());
113 assertEquals(1, secret.getAllValues().stream().distinct().count());
H A DSyntheticPasswordTests.java191 // Check the same secret was passed each time
192 ArgumentCaptor<ArrayList<Byte>> secret = ArgumentCaptor.forClass(ArrayList.class);
193 verify(mAuthSecretService, atLeastOnce()).primaryUserCredential(secret.capture());
194 assertEquals(1, secret.getAllValues().stream().distinct().count());
/frameworks/base/core/java/android/security/keystore/recovery/
H A DKeyChainProtectionParams.java76 * Lockscreen secret is required to recover KeyStore.
111 private byte[] mSecret; // Derived from user secret. The field must have limited visibility.
148 * @return secret or empty array
161 * Sets user secret type.
165 * @param userSecretType The secret type
202 * @param secret The secret.
205 public Builder setSecret(@NonNull byte[] secret) { argument
206 mInstance.mSecret = secret;
233 * Fills secret wit
[all...]
/frameworks/base/core/java/android/os/storage/
H A DIStorageManager.aidl173 void unlockUserKey(int userId, int serialNumber, in byte[] token, in byte[] secret) = 63;
179 void addUserKeyAuth(int userId, int serialNumber, in byte[] token, in byte[] secret) = 70;
H A DStorageManager.java567 * @param key secret used to encrypt the OBB; may be <code>null</code> if no
1296 public void unlockUserKey(int userId, int serialNumber, byte[] token, byte[] secret) { argument
1298 mStorageManager.unlockUserKey(userId, serialNumber, token, secret);
/frameworks/base/services/core/java/com/android/server/locksettings/
H A DSyntheticPasswordManager.java183 public void recreate(byte[] secret) { argument
184 initialize(secret, this.P1);
329 * a default all-zero key is used. If the value is not specified, a fresh random secret is
358 * the verification is successful, throttled or failed. If successful, the bound secret
783 Log.e(TAG, "Failed to enroll weaver secret when activating token", e);
797 final byte[] secret;
799 secret = authToken.computeP0();
801 secret = authToken.syntheticPassword.getBytes();
803 byte[] content = createSPBlob(getHandleName(handle), secret, applicationId, sid);
913 Log.e(TAG, "Failed to retrieve weaver secret whe
1044 transformUnderWeaverSecret(byte[] data, byte[] secret) argument
[all...]
H A DLockSettingsService.java588 // If the user doesn't have a credential, try and derive their secret for the
589 // AuthSecret HAL. The secret will have been enrolled if the user previously set a
1153 private void unlockUser(int userId, byte[] token, byte[] secret) { argument
1175 mActivityManager.unlockUser(userId, token, secret, listener);
1384 // push new secret and auth token to vold
1536 private void addUserKeyAuth(int userId, byte[] token, byte[] secret) argument
1542 storageManager.addUserKeyAuth(userId, userInfo.serialNumber, token, secret);
1755 // FBE keys, so just pass through a fake token/secret
2190 // Pass the primary user's auth secret to the HAL
2194 final ArrayList<Byte> secret
[all...]
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/
H A DSecureBox.java62 * <li>A secret shared between the sender and the recipient, or
63 * <li>Both a recipient's public key and a shared secret.
164 * only with the shared secret
165 * @param sharedSecret the secret shared between the sender and the recipient, or null if the
183 throw new IllegalArgumentException("Both the public key and shared secret are empty");
223 * with the shared secret
224 * @param sharedSecret the secret shared between the sender and the recipient, or null if the
244 throw new IllegalArgumentException("Both the private key and shared secret are empty");
301 private static SecretKey hkdfDeriveKey(byte[] secret, byte[] salt, byte[] info) argument
310 byte[] pseudorandomKey = mac.doFinal(secret);
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DUserController.java1109 boolean unlockUser(final int userId, byte[] token, byte[] secret, IProgressListener listener) { argument
1122 return unlockUserCleared(userId, token, secret, listener);
1147 private boolean unlockUserCleared(final int userId, byte[] token, byte[] secret, argument
1155 storageManager.unlockUserKey(userId, userInfo.serialNumber, token, secret);
H A DActivityManagerShellCommand.java1684 byte[] secret = argToBytes(getNextArgRequired());
1685 boolean success = mInterface.unlockUser(userId, token, secret, null);
H A DActivityManagerService.java26118 unlockUser(int userId, byte[] token, byte[] secret, IProgressListener listener) argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DStorageManagerService.java2490 * Add this token/secret pair to the set of ways we can recover a disk encryption key.
2491 * Changing the token/secret for a disk encryption key is done in two phases: first, adding
2492 * a new token/secret pair with this call, then delting all other pairs with
2497 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { argument
2501 mVold.addUserKeyAuth(userId, serialNumber, encodeBytes(token), encodeBytes(secret));
2508 * Delete all disk encryption token/secret pairs except the most recently added one
2522 public void unlockUserKey(int userId, int serialNumber, byte[] token, byte[] secret) { argument
2526 // When a user has secure lock screen, require secret to actually unlock.
2528 if (mLockPatternUtils.isSecure(userId) && ArrayUtils.isEmpty(secret)) {
2534 encodeBytes(secret));
[all...]
/frameworks/base/core/java/android/app/
H A DIActivityManager.aidl546 boolean unlockUser(int userid, in byte[] token, in byte[] secret,

Completed in 434 milliseconds